-
8
-
-
70349266254
-
FairplayMP: A system for secure multi-party computation
-
A. Ben-David, N. Nisan, and B. Pinkas. FairplayMP: A system for secure multi-party computation. In CCS, 2008.
-
CCS, 2008
-
-
Ben-David, A.1
Nisan, N.2
Pinkas, B.3
-
10
-
-
57049188348
-
Sharemind: A framework for fast privacy-preserving computations
-
D. Bogdanov, S. Laur, and J. Willemson. Sharemind: A framework for fast privacy-preserving computations. In ESORICS, pages 192-206, 2008.
-
(2008)
ESORICS
, pp. 192-206
-
-
Bogdanov, D.1
Laur, S.2
Willemson, J.3
-
11
-
-
84867711104
-
High-performance secure multi-party computation for data mining applications
-
D. Bogdanov, M. Niitsoo, T. Toft, and J. Willemson. High-performance secure multi-party computation for data mining applications. IJIS, 11(6):403-418, 2012.
-
(2012)
IJIS
, vol.11
, Issue.6
, pp. 403-418
-
-
Bogdanov, D.1
Niitsoo, M.2
Toft, T.3
Willemson, J.4
-
14
-
-
84863447066
-
SEPIA: Privacy-preserving aggregation of multi-domain network events and statistics
-
M. Burkhart, M. Strasser, D. Many, and X. Dimitropoulos. SEPIA: Privacy-preserving aggregation of multi-domain network events and statistics. In USENIX Security Symposium, pages 223-240, 2010.
-
(2010)
USENIX Security Symposium
, pp. 223-240
-
-
Burkhart, M.1
Strasser, M.2
Many, D.3
Dimitropoulos, X.4
-
15
-
-
0000731055
-
Security and composition of multiparty cryptographic protocols
-
R. Canetti. Security and composition of multiparty cryptographic protocols. Journal of Cryptology, 13(1):143-202, 2000.
-
(2000)
Journal of Cryptology
, vol.13
, Issue.1
, pp. 143-202
-
-
Canetti, R.1
-
17
-
-
77955328311
-
Secure computation with fixed-point numbers
-
O. Catrina and A. Saxena. Secure computation with fixed-point numbers. In FC, pages 35-50, 2010.
-
(2010)
FC
, pp. 35-50
-
-
Catrina, O.1
Saxena, A.2
-
18
-
-
21144458613
-
Share conversion, pseudorandom secret-sharing and applications to secure computation
-
R. Cramer, I. Damgård, and Y. Ishai. Share conversion, pseudorandom secret-sharing and applications to secure computation. In TCC, pages 342-362, 2005.
-
(2005)
TCC
, pp. 342-362
-
-
Cramer, R.1
Damgård, I.2
Ishai, Y.3
-
19
-
-
67049134126
-
Asynchronous multiparty computation: Theory and implementation
-
I. Damgård, M. Geisler, and M. Krøigård. Asynchronous multiparty computation: Theory and implementation. In PKC, pages 160-179, 2009.
-
(2009)
PKC
, pp. 160-179
-
-
Damgård, I.1
Geisler, M.2
Krøigård, M.3
-
20
-
-
77955317678
-
Secure multiparty AES
-
I. Damgård and M. Keller. Secure multiparty AES. In FC, pages 367-374, 2010.
-
(2010)
FC
, pp. 367-374
-
-
Damgård, I.1
Keller, M.2
-
21
-
-
84873364037
-
Implementing AES via an actively/covertly secure dishonest-majority MPC protocol
-
I. Damgård, M. Keller, E. Larraia, C. Miles, and N. Smart. Implementing AES via an actively/covertly secure dishonest-majority MPC protocol. IACR Cryptology ePrint Archive Report 2012/262, 2012.
-
(2012)
IACR Cryptology EPrint Archive Report 2012/262
-
-
Damgård, I.1
Keller, M.2
Larraia, E.3
Miles, C.4
Smart, N.5
-
22
-
-
85056898575
-
Scalable and unconditionally secure multiparty computation
-
I. Damgård and J. Nielsen. Scalable and unconditionally secure multiparty computation. In CRYPTO, 2007.
-
CRYPTO, 2007
-
-
Damgård, I.1
Nielsen, J.2
-
24
-
-
0347507496
-
The implementation of the Cilk-5 multithreaded language
-
M. Frigo, C. Leiserson, and K. Randall. The implementation of the Cilk-5 multithreaded language. In PLDI, pages 212-223, 1998.
-
(1998)
PLDI
, pp. 212-223
-
-
Frigo, M.1
Leiserson, C.2
Randall, K.3
-
26
-
-
0031628398
-
Simplified VSS and fast-track multiparty computations with applications to threshold cryptography
-
R. Gennaro, M. Rabin, and T. Rabin. Simplified VSS and fast-track multiparty computations with applications to threshold cryptography. In PODC, pages 101-111, 1998.
-
(1998)
PODC
, pp. 101-111
-
-
Gennaro, R.1
Rabin, M.2
Rabin, T.3
-
27
-
-
0023547498
-
Towards a theory of software protection and simulation by oblivious RAMs
-
O. Goldreich. Towards a theory of software protection and simulation by oblivious RAMs. In STOC, 1987.
-
STOC, 1987
-
-
Goldreich, O.1
-
28
-
-
78649992236
-
TASTY: Tool for Automating Secure Two-partY computations
-
W. Henecka, S. Kogl, A.-R. Sadeghi, T. Schneider, and I. Wehrenberg. TASTY: Tool for Automating Secure Two-partY computations. In CCS, pages 451-462, 2010.
-
(2010)
CCS
, pp. 451-462
-
-
Henecka, W.1
Kogl, S.2
Sadeghi, A.-R.3
Schneider, T.4
Wehrenberg, I.5
-
32
-
-
80755169442
-
Automatically optimizing secure computation
-
F. Kerschbaum. Automatically optimizing secure computation. In CCS, pages 703-714, 2011.
-
(2011)
CCS
, pp. 703-714
-
-
Kerschbaum, F.1
-
33
-
-
84870474934
-
Efficient lookup-table protocol in secure multiparty computation
-
J. Launchbury, I. Diatchki, T. DuBuisson, and A. Adams-Moran. Efficient lookup-table protocol in secure multiparty computation. In ICFP, pages 189-200, 2012.
-
(2012)
ICFP
, pp. 189-200
-
-
Launchbury, J.1
Diatchki, I.2
DuBuisson, T.3
Adams-Moran, A.4
-
34
-
-
84879868386
-
From oblivious AES to efficient and secure database join in the multiparty setting
-
S. Laur, R. Talviste, and J. Willemson. From oblivious AES to efficient and secure database join in the multiparty setting. In ACNS, pages 84-101, 2013.
-
(2013)
ACNS
, pp. 84-101
-
-
Laur, S.1
Talviste, R.2
Willemson, J.3
-
35
-
-
85084163840
-
Fairplay - A secure two-party computation system
-
D. Malkhi, N. Nisan, B. Pinkas, and Y. Sella. Fairplay - a secure two-party computation system. In USENIX Security Symposium, pages 287-302, 2004.
-
(2004)
USENIX Security Symposium
, pp. 287-302
-
-
Malkhi, D.1
Nisan, N.2
Pinkas, B.3
Sella, Y.4
-
37
-
-
80054976361
-
L1 - An intermediate language for mixed-protocol secure computation
-
A. Schroepfer, F. Kerschbaum, and G. Mueller. L1 - An intermediate language for mixed-protocol secure computation. In COMPSAC, pages 298-307, 2011.
-
(2011)
COMPSAC
, pp. 298-307
-
-
Schroepfer, A.1
Kerschbaum, F.2
Mueller, G.3
-
38
-
-
0018545449
-
How to share a secret
-
A. Shamir. How to share a secret. Communications of the ACM, 22(11):612-613, 1979.
-
(1979)
Communications of the ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
|